The Legendary Era of Computer Virus and Their Detection
Keywords:
Antivirus Techniques, Computer Antivirus, Creation, Defensive, Metamorphism, NGVCK, Virus.Abstract
In this paper, anti-virus professionals layout and develop new methodologies to lead them to more potent, more and more, every day. The cause of this paper is to review these methodologies and description their strengths and weaknesses to inspire those are inquisitive about more research on those regions. In this paper, first examine 4 virus advent kits to determine the degree of metamorphism provided by way of each and capable of precisely quantify the diploma of metamorphism produced by way of these virus mills. While the nice generator, the Next Generation Virus Creation Kit (NGVCK), produces virus editions that range greatly from each other, the alternative 3 turbines examined are tons much less powerful. This paper gives a trendy evaluate on laptop viruses and protective strategies. Computer virus writers commonly use metamorphic strategies to produce viruses that exchange their inner structure on every infection. On the opposite hand, anti-virus technology always follow the virus hints and methodologies to triumph over their threats.
References
- Leonard Adleman. An abstract theory of computer viruses. In Lecture Notes in Computer Science, vol 403. Springer-Verlag, 1990.
- M. Stamp, “Information Security: Principles and Practice,” August 2005.
- Fred Cohen. Computer Viruses. PhD thesis, University of Southern California, 1985.
- Peter J. Denning, editor. Computers Under Attack: Intruders, Worms and Viruses. ACMPress (Addison-Wesley), 1990.
- Christopher V. Feudo. The Computer VirusDesk Reference. Business One Irwin, Homewood, IL, 1992.
- Harold Joseph Highland, editor. Computer Virus Handbook. Elsevier Advanced Technology, 1990.
- J. Aycock, “Computer Viruses and malware,” Springer Science+Business Media, 2006.
- E. Daoud and I. Jebril, “Computer Virus Strategies and Detection Methods,” Int. J. Open Problems Compt. Math., Vol. 1, No. 2, September 2008. Http://www.Emis.De/journals/IJOPCM/documents/IJOPCM(vol.1.2.3.S.08).Pdf
- Lance J.Hoffman, editor. Rogue Programs:Viruses,Worms, and Trojan Horses. VanNostrand Reinhold, New York, NY, 1990.
- Jan Hruska. Computer Viruses and Anti-VirusWarfare. Ellis Horwood, Chichester, England, 1990.
- Filiol, E., G. Jacob, M.L. Liard, 2007. Evaluation technique and theoretical version for antiviral behavioral detection strategies. J. Comput. Virol., three(1): 27-37
- Ye, Y., D. Wang, T. Li and D. Ye, 2008. An sensible pe-malware detection device primarily based on association mining. In Journal in Computer Virology,
- Zakorzhevsky, 2011. Monthly Malware Statistics. Available from : http://www.Securelist.Com/en/evaluation/204792182/Monthly_Malware_Statistics_June_ Accessed 2 July.
- W. Wong, “Analysis and Detection of Metamorphic Computer Viruses,” Master’s thesis, San Jose State University, 2006. Http://www.Cs.Sjsu.Edu/college/stamp/college students/Report.Pdf
- Eugene H. Spafford. Computer viruses. In John Marciniak, editor, Encyclopedia of Software Engineering. JohnWiley & Sons, 1994.
- S. Attaluri, “Profile hidden Markov models for metamorphic virus evaluation,” Master’s thesis, San Jose State University, 2007. Http://www.Cs.Sjsu.Edu/college/stamp/college students/Srilatha_cs298Report.Pdf
- P. Szor, “The Art of Computer Virus Defense and Research,” Symantec Press 2005. 18] VX Heavens, http://vx.Netlux.Org/International Journal of Network Security & Its Applications (IJNSA), Vol.Four, No.Three, May 2012
- Orr, “The viral Darwinism of W32.Evol: An in-depth analysis of a metamorphic engine,” 2006. Http://www.Antilife.Org/documents/Evol.Pdf
- E. Konstantinou, “Metamorphic Virus: Analysis and Detection,” January 2008. 21] A. Venkatesan, “Code Obfuscation and Metamoprhic Virus Detection,” Master’s thesis, San Jose State University, 2008. Http://www.Cs.Sjsu.Edu/college/stamp/students/ashwini_venkatesan_cs298report.Doc
- The Mental Driller, “Metamorphism in practice or How I made MetaPHOR and what I've learnt,” February 2002. Http://vx.Netlux.Org/lib/vmd01.Html
- M. Stamp, “A Revealing Introduction to Hidden Markov Models”, January 2004. Http://www.Cs.Sjsu.Edu/school/stamp/RUA/HMM.Pdf
- Walenstein, R. Mathur, M. Chouchane R. Chouchane, and A. Lakhotia, “The design area of metamorphic malware,” In Proceedings of the second International Conference on Information Warfare, March 2007.
- “Benny/29A", Theme: metamorphism, http://www.Vx.Netlux.Org/lib/static/vdat/epmetam2.Htm
- J. Borello and L. Me, “Code Obfuscation Techniques for Metamorphic Viruses”, Feb 2008, http://www.Springerlink.Com/content/233883w3r2652537
- A. Lakhotia, “Are metamorphic viruses in reality invincible?” Virus Bulletin, December 2005.
- JDB. EstiHMM: een greeǹˆ algoritme ter bepaling van de maximale sequenties in een imprecies hidden Markovmodel. Master Thesis at Ghent University. Supervised by GdC. June 2011.
- JDB & GdC. State sequence prediction in vague hidden Markov models. ISIPTA 'eleven: pp. 159-168. July 2011.
Lea
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.